Tagged articles
26 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 20, 2026 · Information Security

Is Cisco Facing an Epic Leak Crisis? The Triple Threat of Supply Chain, Source Code, and Keys

A high‑risk incident reported by ShinyHunters claims Cisco’s core source code, private keys, API tokens, AWS bucket rights, GitHub repositories, and millions of Salesforce records are being sold for $210,000, highlighting how simultaneous exposure of code and credentials can turn a data breach into an ecosystem‑wide compromise.

CiscoPrivate keysSupply Chain
0 likes · 5 min read
Is Cisco Facing an Epic Leak Crisis? The Triple Threat of Supply Chain, Source Code, and Keys
Black & White Path
Black & White Path
Apr 17, 2026 · Information Security

Why US‑Made Network Gear Crashed During the Isfahan Attack: Four Possible Digital Kill‑Switch Scenarios

During the April 2026 US‑Israel strike on Iran's Isfahan province, Cisco, Fortinet, and Juniper devices abruptly failed, prompting analysts to propose four precise, non‑network‑dependent attack methods ranging from hidden backdoors to supply‑chain tampering and to warn of a new era of digital‑focused warfare.

CiscoCyberattackDigital Warfare
0 likes · 5 min read
Why US‑Made Network Gear Crashed During the Isfahan Attack: Four Possible Digital Kill‑Switch Scenarios
Black & White Path
Black & White Path
Apr 3, 2026 · Information Security

Cisco Faces New Data Breach Ultimatum After ShinyHunters Exposes FBI, NASA Records

In March 2026, the ShinyHunters ransomware group claimed to have breached Cisco's Salesforce CRM, GitHub repositories, and AWS S3 buckets, stealing over 3 million records that include personnel data from U.S. agencies such as the FBI, DHS, IRS, NASA, as well as Australian and Indian government entities, and issued an ultimatum for Cisco to respond by April 3.

AWSCiscoOAuth
0 likes · 9 min read
Cisco Faces New Data Breach Ultimatum After ShinyHunters Exposes FBI, NASA Records
Linux Code Review Hub
Linux Code Review Hub
Feb 27, 2024 · Fundamentals

How to Compute Headroom for Lossless Ethernet Links (Part 2)

This section analytically derives the headroom size for loss‑less Ethernet links using IEEE 802.1Qbb priority flow control, detailing worst‑case delays, interface and cable latency, buffer cell sizing, Cisco Nexus configuration examples, and a comparison with Fibre Channel B2B primitives.

BuffersCiscoDataCenter
0 likes · 22 min read
How to Compute Headroom for Lossless Ethernet Links (Part 2)
21CTO
21CTO
Sep 12, 2023 · Information Security

BroadWorks Auth Bypass (CVE-2023-20238) & RADIUS DoS (CVE-2023-20243) Alerts

Cisco has issued six security advisories, including a critical authentication bypass vulnerability in its BroadWorks Application Delivery and Extension Service Platform (CVE‑2023‑20238) and a high‑severity RADIUS denial‑of‑service flaw in its Identity Services Engine (CVE‑2023‑20243), with CISA also issuing alerts and urging users to review and mitigate the issues.

Authentication BypassCVE-2023-20238CVE-2023-20243
0 likes · 2 min read
BroadWorks Auth Bypass (CVE-2023-20238) & RADIUS DoS (CVE-2023-20243) Alerts
Open Source Linux
Open Source Linux
May 23, 2023 · Fundamentals

Hands‑On OSPF Lab: Configuring Huawei, Cisco, and Juniper Networks

This article provides step‑by‑step OSPF lab exercises for Huawei, Cisco, and Juniper devices, covering basic OSPF concepts, configuration guidelines, verification commands, and troubleshooting tips, enabling readers to build and test a multi‑vendor OSPF network topology.

CiscoHuaweiJuniper
0 likes · 23 min read
Hands‑On OSPF Lab: Configuring Huawei, Cisco, and Juniper Networks
Qunar Tech Salon
Qunar Tech Salon
Mar 10, 2022 · Operations

Design and Implementation of Cisco Nexus VPC for Qunar K8S Network

This article details the background, design rationale, network topology changes, and step‑by‑step procedures—including VPC configuration, BGP setup, and port‑channel adjustments—used to upgrade Qunar's data‑center network for Kubernetes deployments, with practical code examples and operational tips.

BGPCiscoDataCenter
0 likes · 11 min read
Design and Implementation of Cisco Nexus VPC for Qunar K8S Network
Architects' Tech Alliance
Architects' Tech Alliance
Jun 20, 2021 · Fundamentals

Mastering Cisco Routing: When to Use Multiple Protocols, Access Lists, and Redistribution

This comprehensive guide explains when to employ multiple routing protocols, compares distance‑vector and link‑state routing, details access‑list types and creation commands, outlines route redistribution steps and commands, clarifies administrative distance, BGP fundamentals, metric concepts, and provides hardware compatibility notes for Cisco routers and switches.

BGPCiscoNetworking
0 likes · 26 min read
Mastering Cisco Routing: When to Use Multiple Protocols, Access Lists, and Redistribution
Architects Research Society
Architects Research Society
Jun 8, 2020 · Operations

Data Center Structure Management and Automation with Cisco DCNM and Spine‑Leaf Architectures

This article explains various Cisco tools and architectures for data‑center structure management and automation, including Cisco Data Center Network Manager modes, Network Insights applications, and a detailed comparison of FabricPath, VXLAN flood‑and‑learn, VXLAN MP‑BGP EVPN, and MSDC Layer 3 spine‑leaf designs.

CiscoDCNMSpine‑Leaf
0 likes · 16 min read
Data Center Structure Management and Automation with Cisco DCNM and Spine‑Leaf Architectures
Architects Research Society
Architects Research Society
Jun 6, 2020 · Cloud Computing

Cisco VXLAN Flood and Learn Spine‑and‑Leaf Network Overview

This article explains Cisco's VXLAN flood‑and‑learn spine‑and‑leaf architecture, covering its standards compliance, encapsulation format, underlay and overlay network design, multicast and ingress replication, host discovery, routing, and multi‑tenant support for both Layer 2 and Layer 3 environments.

CiscoNetwork VirtualizationOverlay Network
0 likes · 11 min read
Cisco VXLAN Flood and Learn Spine‑and‑Leaf Network Overview
Architects Research Society
Architects Research Society
Jun 4, 2020 · Cloud Computing

Network Overlay Technologies for Modern Virtualized Data Center Architectures

The article explains the requirements of modern virtualized data‑center structures, describes network overlay concepts and formats such as VXLAN, NVGRE, TRILL and LISP, outlines their benefits like optimized device functions, scalability and overlapping addressing, and reviews Cisco's spine‑and‑leaf designs that meet these needs.

CiscoNetwork OverlayVXLAN
0 likes · 5 min read
Network Overlay Technologies for Modern Virtualized Data Center Architectures
Architects' Tech Alliance
Architects' Tech Alliance
Sep 19, 2019 · Industry Insights

Why 400G Optical Modules Are Poised to Transform Data Centers

The article analyzes the rapid growth of 400G optical modules, comparing OSFP and QSFP‑DD form factors, detailing Cisco's new Nexus 400G switch lineup and Broadcom's BCM87400 PAM‑4 PHY, and explains how these technologies are set to meet expanding data‑center bandwidth demands while highlighting market adoption trends and potential cost trade‑offs.

400GBroadcomCisco
0 likes · 16 min read
Why 400G Optical Modules Are Poised to Transform Data Centers
DevOps Cloud Academy
DevOps Cloud Academy
Aug 9, 2019 · Operations

Static Routing Configuration and Verification on Cisco Routers

This guide explains the concepts of routing tables, static and default routes, and provides step‑by‑step Cisco router configuration commands and verification procedures to achieve full network connectivity between two routers and their attached PCs.

CiscoIP routingRouter configuration
0 likes · 4 min read
Static Routing Configuration and Verification on Cisco Routers
DevOps Cloud Academy
DevOps Cloud Academy
Aug 9, 2019 · Operations

Guide to Cisco Switch Configuration Commands and Modes

This article explains the different Cisco device configuration modes—user, privileged, global, and interface—provides command examples for setting hostnames, viewing version and MAC tables, and configuring duplex and speed settings on switch ports, illustrated with screenshots.

CLICiscoDuplex
0 likes · 3 min read
Guide to Cisco Switch Configuration Commands and Modes
Practical DevOps Architecture
Practical DevOps Architecture
Jul 25, 2019 · Information Security

Configuring an IPSec VPN Between Huawei and Cisco Routers Using Virtual Tunnel Interfaces

This guide explains the security risks of transparent Internet data transmission, introduces IPSec's authentication, encryption, integrity, and anti‑replay features, and provides step‑by‑step Huawei and Cisco router configurations—including interface setup, IKE proposals, IPSec profiles, and verification commands—to securely connect branch and headquarters networks via a VPN.

CiscoHuaweiIPSec
0 likes · 13 min read
Configuring an IPSec VPN Between Huawei and Cisco Routers Using Virtual Tunnel Interfaces
Architects' Tech Alliance
Architects' Tech Alliance
Nov 7, 2018 · Fundamentals

Survey of Network Types and Vendors in High‑Performance Computing (HPC) Environments

The Intersect360 2016 survey of 474 HPC sites covering 723 compute systems, 633 storage systems and 638 LANs reveals that Ethernet and InfiniBand dominate system interconnect, storage and LAN networks, with Mellanox and Cisco accounting for over half of installations, while newer technologies such as 10 GE, 40 G, 56 G InfiniBand and Omni‑Path show evolving market shares driven by bandwidth and latency demands.

CiscoHPCInfiniBand
0 likes · 10 min read
Survey of Network Types and Vendors in High‑Performance Computing (HPC) Environments
Practical DevOps Architecture
Practical DevOps Architecture
Nov 16, 2015 · Fundamentals

Configuring Router Interface IP and DHCP Settings

This guide explains how to configure a router’s FastEthernet interface with a static IP address, enable DHCP services, set address exclusions, and configure a host to obtain its IP settings automatically, using Cisco IOS command-line syntax.

CiscoDHCPIP Configuration
0 likes · 2 min read
Configuring Router Interface IP and DHCP Settings
Practical DevOps Architecture
Practical DevOps Architecture
May 28, 2015 · Operations

10 Cisco IOS Service Subcommands and Their Usage

This article lists and explains ten Cisco IOS service subcommands—including service dhcp, service linenumber, service password-encryption, service nagle, and others—detailing their functions, typical usage scenarios, and security considerations for configuring routers and switches.

CiscoRouter configurationiOS
0 likes · 6 min read
10 Cisco IOS Service Subcommands and Their Usage